Embodiments include methods, systems and computer program products for providing access to a secure service. Aspects include receiving, from a user device, a request to access a secure service, the request including access information and receiving, from the user device, a requested action on the secure service. Aspects also include correlating the access information and the requested action with stored information associated with the user device and performing the requested action, in response to said correlating.